Skip to content

Canopy Blog: Data Breach Response (2)

Person holding a plate with an apple and a plate with an orange

9 Differences Between Data Breach and Litigation Reviews

In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health Information (PHI) to determine if a data breach of protected..

Read More

man processing breached data on computer powered by AI/machine learning brain

Unpacking the Jargon of Data Breach Response

Canopy is the core of a unique process in the ever-growing field of data breach response. A delicate balance of people, process, and technology come together on every project to..

Read More

Person trying to fit a square block into a round hole

Challenging Convention: Ediscovery Software Shouldn't Be Used for Data Breach Response

Data privacy regulations are growing in number and complexity, but one thing remains the same through this evolution: the time constraints are severe. That’s just one of the many..

Read More

Data breach response team checking off tasks on checklist

How to Make Your Incident Response Plan

  At Legalweek New York 2019, Canopy attended the Beyond The Attack – Legal & Ethical Considerations In Breach Response session. The panel educated us about the interplay between..

Read More

blue waves representing customer churn after data breach

4 Ways to Reduce Abnormal Churn After a Data Breach

Abnormal churn, defined as the loss of customers due to a data breach, is on the rise in the United States. According to the 2018 Cost of Data Breach Study by IBM and the Ponemon..

Read More